{"id":"https://openalex.org/W2914815840","doi":"https://doi.org/10.1109/bigdata.2018.8622269","title":"Detecting unmanaged and unauthorized devices on the network with long short-term memory network","display_name":"Detecting unmanaged and unauthorized devices on the network with long short-term memory network","publication_year":2018,"publication_date":"2018-12-01","ids":{"openalex":"https://openalex.org/W2914815840","doi":"https://doi.org/10.1109/bigdata.2018.8622269","mag":"2914815840"},"language":"en","primary_location":{"id":"doi:10.1109/bigdata.2018.8622269","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2018.8622269","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110595057","display_name":"Derek Lin","orcid":"https://orcid.org/0009-0004-8526-0887"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Derek Lin","raw_affiliation_strings":["Exabeam, Inc., San Mateo, California, USA"],"affiliations":[{"raw_affiliation_string":"Exabeam, Inc., San Mateo, California, USA","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5049233577","display_name":"Baoming Tang","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Baoming Tang","raw_affiliation_strings":["Exabeam, Inc., San Mateo, California, USA"],"affiliations":[{"raw_affiliation_string":"Exabeam, Inc., San Mateo, California, USA","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5110595057"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.3691,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.66902267,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":"60","issue":null,"first_page":"2980","last_page":"2985"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7398185729980469},{"id":"https://openalex.org/keywords/term","display_name":"Term (time)","score":0.5626099705696106},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5565229058265686},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.5465566515922546},{"id":"https://openalex.org/keywords/flag","display_name":"Flag (linear algebra)","score":0.5067728161811829},{"id":"https://openalex.org/keywords/corporation","display_name":"Corporation","score":0.4115346074104309},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1391162872314453}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7398185729980469},{"id":"https://openalex.org/C61797465","wikidata":"https://www.wikidata.org/wiki/Q1188986","display_name":"Term (time)","level":2,"score":0.5626099705696106},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5565229058265686},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.5465566515922546},{"id":"https://openalex.org/C2776730729","wikidata":"https://www.wikidata.org/wiki/Q1392130","display_name":"Flag (linear algebra)","level":3,"score":0.5067728161811829},{"id":"https://openalex.org/C2778348171","wikidata":"https://www.wikidata.org/wiki/Q167037","display_name":"Corporation","level":2,"score":0.4115346074104309},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1391162872314453},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136119220","wikidata":"https://www.wikidata.org/wiki/Q1000660","display_name":"Algebra over a field","level":2,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bigdata.2018.8622269","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bigdata.2018.8622269","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE International Conference on Big Data (Big Data)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W391985582","https://openalex.org/W1513845815","https://openalex.org/W1591825359","https://openalex.org/W1914084308","https://openalex.org/W2007087405","https://openalex.org/W2022520190","https://openalex.org/W2046071314","https://openalex.org/W2064675550","https://openalex.org/W2116261113","https://openalex.org/W2130942839","https://openalex.org/W2157331557","https://openalex.org/W2278186031","https://openalex.org/W2280602177","https://openalex.org/W2517435166","https://openalex.org/W2546910111","https://openalex.org/W2748868501","https://openalex.org/W2771641736","https://openalex.org/W6635189695","https://openalex.org/W6679436768","https://openalex.org/W6729497825","https://openalex.org/W6743493502"],"related_works":["https://openalex.org/W2324035390","https://openalex.org/W2963151310","https://openalex.org/W3175137310","https://openalex.org/W2583526987","https://openalex.org/W3034984450","https://openalex.org/W2695311495","https://openalex.org/W3139271019","https://openalex.org/W2098156551","https://openalex.org/W4401592300","https://openalex.org/W1895129854"],"abstract_inverted_index":{"Unmanaged":[0],"and":[1,55,70,136],"unauthorized":[2,56,137],"devices":[3,17,31,39,57,96,138],"present":[4,41],"in":[5,139],"a":[6,43,82,107,130],"corporate":[7,45,141],"network":[8,112],"pose":[9],"potential":[10],"security":[11],"risk.":[12],"Gaining":[13],"insights":[14],"into":[15],"these":[16,30],"starts":[18],"with":[19,97],"their":[20],"identification.":[21],"However,":[22],"there":[23],"have":[24],"been":[25],"few":[26],"studies":[27],"that":[28,100],"recognize":[29],"among":[32],"tens":[33],"to":[34,66,94,118,133],"hundreds":[35],"of":[36,38,52,78,90],"thousands":[37],"typically":[40],"on":[42],"large":[44],"network.":[46],"On":[47],"the":[48,53,67,76,87,115,120,127],"other":[49],"hand,":[50],"names":[51,93,99,117],"unmanaged":[54,135],"are":[58,101],"telling,":[59],"as":[60],"they":[61],"do":[62],"not":[63],"necessarily":[64],"conform":[65],"existing":[68],"known":[69],"unknown":[71],"naming":[72],"conventions":[73],"followed":[74],"by":[75,81],"majority":[77],"machines":[79],"managed":[80],"corporation.":[83],"This":[84],"work":[85],"examines":[86],"lexical":[88],"content":[89],"networked":[91],"device":[92,116],"flag":[95,119],"unusual":[98],"worth":[102],"noting.":[103],"We":[104,124],"show":[105],"how":[106,126],"long":[108],"short-term":[109],"memory":[110],"(LSTM)":[111],"learns":[113],"from":[114],"anomalously":[121],"named":[122],"devices.":[123],"demonstrate":[125],"method":[128],"offers":[129],"practical":[131],"solution":[132],"detect":[134],"real-world":[140],"networks.":[142]},"counts_by_year":[{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
